• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * libwebsockets - small server side websockets and web server implementation
3  *
4  * Copyright (C) 2010 - 2021 Andy Green <andy@warmcat.com>
5  *
6  * Permission is hereby granted, free of charge, to any person obtaining a copy
7  * of this software and associated documentation files (the "Software"), to
8  * deal in the Software without restriction, including without limitation the
9  * rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
10  * sell copies of the Software, and to permit persons to whom the Software is
11  * furnished to do so, subject to the following conditions:
12  *
13  * The above copyright notice and this permission notice shall be included in
14  * all copies or substantial portions of the Software.
15  *
16  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17  * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18  * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
19  * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20  * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
21  * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
22  * IN THE SOFTWARE.
23  */
24 
25 /** \defgroup cose COSE apis
26  * ##COSE related functions
27  * \ingroup lwsaoi
28  *
29  * COSE RFC 8152 relates to signed and encrypted CBOR
30  */
31 //@{
32 
33 enum {
34 	/*  RFC8152: Table 2: Common Header Parameters
35 	 * https://www.iana.org/assignments/cose/cose.xhtml#header-parameters
36 	 */
37 
38 	LWSCOSE_WKL_ALG				= 1,   /* int / tstr */
39 	LWSCOSE_WKL_CRIT,			       /* [+ label ] */
40 	LWSCOSE_WKL_CONTENT_TYPE,		       /* tstr / uint */
41 	LWSCOSE_WKL_KID,			       /* bstr */
42 	LWSCOSE_WKL_IV,				       /* bstr */
43 	LWSCOSE_WKL_IV_PARTIAL,			       /* bstr */
44 	LWSCOSE_WKL_COUNTERSIG,			       /* COSE sig(s) */
45 	LWSCOSE_WKL_COUNTERSIG0			= 9,   /* bstr */
46 	LWSCOSE_WKL_KID_CONTEXT,		       /* bstr */
47 	LWSCOSE_WKL_CUPH_NONCE			= 256, /* bstr */
48 	LWSCOSE_WKL_CUPH_OWNER_PUBKEY		= 257, /* array */
49 
50 	/*  RFC8152: Table 3: key map labels */
51 
52 	LWSCOSE_WKK_KTY				= 1, /* int / tstr */
53 	LWSCOSE_WKK_KID,			     /* bstr */
54 	LWSCOSE_WKK_ALG,			     /* int / tstr */
55 	LWSCOSE_WKK_KEY_OPS,			     /* [ + (int / tstr) ] */
56 	LWSCOSE_WKK_BASE_IV,			     /* bstr */
57 
58 	/*  RFC8152: Table 4: Key Operation Values */
59 
60 	LWSCOSE_WKKO_SIGN			= 1,
61 	LWSCOSE_WKKO_VERIFY,
62 	LWSCOSE_WKKO_ENCRYPT,
63 	LWSCOSE_WKKO_DECRYPT,
64 	LWSCOSE_WKKO_WRAP_KEY,
65 	LWSCOSE_WKKO_UNWRAP_KEY,
66 	LWSCOSE_WKKO_DERIVE_KEY,
67 	LWSCOSE_WKKO_DERIVE_BITS,
68 	LWSCOSE_WKKO_MAC_CREATE,
69 	LWSCOSE_WKKO_MAC_VERIFY,
70 
71 	/*  RFC8152: Table 5: ECDSA algs */
72 
73 	LWSCOSE_WKAECDSA_ALG_ES256		= -7,
74 	LWSCOSE_WKAECDSA_ALG_ES384		= -35,
75 	LWSCOSE_WKAECDSA_ALG_ES512		= -36,
76 
77 	/*  RFC8152: Table 6: EDDSA algs */
78 
79 	LWSCOSE_WKAEDDSA_ALG_EDDSA		= -8,
80 
81 	/*  RFC8152: Table 7: HMAC algs */
82 
83 	LWSCOSE_WKAHMAC_256_64			= 4,
84 	LWSCOSE_WKAHMAC_256_256,
85 	LWSCOSE_WKAHMAC_384_384,
86 	LWSCOSE_WKAHMAC_512_512,
87 
88 	/*  RFC8152: Table 8: AES algs */
89 
90 	LWSCOSE_WKAAES_128_64			= 14,
91 	LWSCOSE_WKAAES_256_64,
92 	LWSCOSE_WKAAES_128_128			= 25,
93 	LWSCOSE_WKAAES_256_128,
94 
95 	/*  RFC8152: Table 9: AES GCM algs */
96 
97 	LWSCOSE_WKAAESGCM_128			= 1,
98 	LWSCOSE_WKAAESGCM_192,
99 	LWSCOSE_WKAAESGCM_256,
100 
101 	/*  RFC8152: Table 10: AES CCM algs */
102 
103 	LWSCOSE_WKAAESCCM_16_64_128		= 10,
104 	LWSCOSE_WKAAESCCM_16_64_256,
105 	LWSCOSE_WKAAESCCM_64_64_128,
106 	LWSCOSE_WKAAESCCM_64_64_256,
107 	LWSCOSE_WKAAESCCM_16_128_128,
108 	LWSCOSE_WKAAESCCM_16_128_256,
109 	LWSCOSE_WKAAESCCM_64_128_128,
110 	LWSCOSE_WKAAESCCM_64_128_256,
111 
112 	/*  RFC8152: Table 11: CHACHA20 / Poly1305 */
113 
114 	LWSCOSE_WKACHACHA_POLY1305		= 24,
115 
116 	/*  RFC8152: Table 13: HKDF param */
117 
118 	LWSCOSE_WKAPHKDF_SALT			= -20,
119 
120 	/* RFC8152: Table 14: Context Algorithm Parameters */
121 
122 	LWSCOSE_WKAPCTX_PARTY_U_IDENTITY	= -21,
123 	LWSCOSE_WKAPCTX_PARTY_U_NONCE		= -22,
124 	LWSCOSE_WKAPCTX_PARTY_U_OTHER		= -23,
125 	LWSCOSE_WKAPCTX_PARTY_V_IDENTITY	= -24,
126 	LWSCOSE_WKAPCTX_PARTY_V_NONCE		= -25,
127 	LWSCOSE_WKAPCTX_PARTY_V_OTHER		= -26,
128 
129 	/* RFC8152: Table 15: Direct key */
130 
131 	LWSCOSE_WKK_DIRECT_CEK			= -6,
132 
133 	/* RFC8152: Table 16: Direct key with KDF */
134 
135 	LWSCOSE_WKK_DIRECT_HKDF_SHA_256		= -10,
136 	LWSCOSE_WKK_DIRECT_HKDF_SHA_512		= -11,
137 	LWSCOSE_WKK_DIRECT_HKDF_AES_128		= -12,
138 	LWSCOSE_WKK_DIRECT_HKDF_AES_256		= -13,
139 
140 	/* RFC8152: Table 17: AES Key Wrap Algorithm Values */
141 
142 	LWSCOSE_WKK_DIRECT_HKDFKW_SHA_256	= -3,
143 	LWSCOSE_WKK_DIRECT_HKDFKW_SHA_512	= -4,
144 	LWSCOSE_WKK_DIRECT_HKDFKW_AES_128	= -5,
145 
146 	/* RFC8152: Table 18: ECDH Algorithm Values */
147 
148 	LWSCOSE_WKAECDH_ALG_ES_HKDF_256		= -25,
149 	LWSCOSE_WKAECDH_ALG_ES_HKDF_512		= -26,
150 	LWSCOSE_WKAECDH_ALG_SS_HKDF_256		= -27,
151 	LWSCOSE_WKAECDH_ALG_SS_HKDF_512		= -28,
152 
153 	/* RFC8152: Table 19: ECDH Algorithm Parameters */
154 
155 	LWSCOSE_WKAPECDH_EPHEMERAL_KEY		= -1,
156 	LWSCOSE_WKAPECDH_STATIC_KEY		= -2,
157 	LWSCOSE_WKAPECDH_STATIC_KEY_ID		= -3,
158 
159 	/* RFC8152: Table 20: ECDH Algorithm Parameters with key wrap */
160 
161 	LWSCOSE_WKAPECDH_ES_A128KW		= -29,
162 	LWSCOSE_WKAPECDH_ES_A192KW		= -30,
163 	LWSCOSE_WKAPECDH_ES_A256KW		= -31,
164 	LWSCOSE_WKAPECDH_SS_A128KW		= -32,
165 	LWSCOSE_WKAPECDH_SS_A192KW		= -33,
166 	LWSCOSE_WKAPECDH_SS_A256KW		= -34,
167 
168 	/* RFC8152: Table 21: Key Type Values
169 	 *  https://www.iana.org/assignments/cose/cose.xhtml#key-type
170 	 */
171 
172 	LWSCOSE_WKKTV_OKP			= 1,
173 	LWSCOSE_WKKTV_EC2			= 2,
174 	LWSCOSE_WKKTV_RSA			= 3,
175 	LWSCOSE_WKKTV_SYMMETRIC			= 4,
176 	LWSCOSE_WKKTV_HSS_LMS			= 5,
177 	LWSCOSE_WKKTV_WALNUTDSA			= 6,
178 
179 
180 	/* RFC8152: Table 22: Elliptic Curves
181 	 * https://www.iana.org/assignments/cose/cose.xhtml#elliptic-curves
182 	 */
183 
184 	LWSCOSE_WKEC_P256			= 1,
185 	LWSCOSE_WKEC_P384,
186 	LWSCOSE_WKEC_P521,
187 	LWSCOSE_WKEC_X25519,
188 	LWSCOSE_WKEC_X448,
189 	LWSCOSE_WKEC_ED25519,
190 	LWSCOSE_WKEC_ED448,
191 	LWSCOSE_WKEC_SECP256K1,
192 
193 	/* RFC8152: Table 23: EC Key Parameters */
194 
195 	LWSCOSE_WKECKP_CRV			= -1,
196 	LWSCOSE_WKECKP_X			= -2,
197 	LWSCOSE_WKECKP_Y			= -3,
198 	LWSCOSE_WKECKP_D			= -4,
199 
200 	/* RFC8152: Table 24: Octet Key Pair (OKP) Parameters */
201 
202 	LWSCOSE_WKOKP_CRV			= -1,
203 	LWSCOSE_WKOKP_X				= -2,
204 	LWSCOSE_WKOKP_D				= -4,
205 
206 	/* Additional from
207 	 * https://www.iana.org/assignments/cose/cose.xhtml#key-type-parameters
208 	 */
209 
210 	LWSCOSE_WKKPRSA_N			= -1,
211 	LWSCOSE_WKKPRSA_E			= -2,
212 	LWSCOSE_WKKPRSA_D			= -3,
213 	LWSCOSE_WKKPRSA_P			= -4,
214 	LWSCOSE_WKKPRSA_Q			= -5,
215 	LWSCOSE_WKKPRSA_DP			= -6,
216 	LWSCOSE_WKKPRSA_DQ			= -7,
217 	LWSCOSE_WKKPRSA_QINV			= -8,
218 	LWSCOSE_WKKPRSA_OTHER			= -9,
219 	LWSCOSE_WKKPRSA_RI			= -10,
220 	LWSCOSE_WKKPRSA_DI			= -11,
221 	LWSCOSE_WKKPRSA_TI			= -12,
222 
223 	/* RFC8152: Table 25: Symmetric Key Parameters */
224 
225 	LWSCOSE_WKSYMKP_KEY_VALUE		= 4,
226 
227 	/* RFC8152: Table 26: CoAP Content-Formats for COSE */
228 
229 	LWSCOAP_CONTENTFORMAT_COSE_SIGN		= 98,
230 	LWSCOAP_CONTENTFORMAT_COSE_SIGN1	= 18,
231 	LWSCOAP_CONTENTFORMAT_COSE_ENCRYPT	= 96,
232 	LWSCOAP_CONTENTFORMAT_COSE_ENCRYPT0	= 16,
233 	LWSCOAP_CONTENTFORMAT_COSE_MAC		= 97,
234 	LWSCOAP_CONTENTFORMAT_COSE_MAC0		= 17,
235 	LWSCOAP_CONTENTFORMAT_COSE_KEY		= 101,
236 	LWSCOAP_CONTENTFORMAT_COSE_KEY_SET	= 102,
237 
238 	/* RFC8152: Table 27: Header Parameter for CounterSignature0 */
239 
240 	LWSCOSE_WKL_COUNTERSIGNATURE0		= 9, /* bstr */
241 
242 	/* RFC8812: Table 1: RSASSA-PKCS1-v1_5 Algorithm Values */
243 
244 	LWSCOSE_WKARSA_ALG_RS256		= -257, /* + SHA-256 */
245 	LWSCOSE_WKARSA_ALG_RS384		= -258, /* + SHA-384 */
246 	LWSCOSE_WKARSA_ALG_RS512		= -259, /* + SHA-512 */
247 };
248 
249 enum enum_cose_key_meta_tok {
250 	COSEKEY_META_KTY,
251 	COSEKEY_META_KID,
252 	COSEKEY_META_KEY_OPS,
253 	COSEKEY_META_BASE_IV,
254 	COSEKEY_META_ALG,
255 
256 	LWS_COUNT_COSE_KEY_ELEMENTS
257 };
258 
259 typedef int64_t cose_param_t;
260 
261 LWS_VISIBLE LWS_EXTERN const char *
262 lws_cose_alg_to_name(cose_param_t alg);
263 
264 LWS_VISIBLE LWS_EXTERN cose_param_t
265 lws_cose_name_to_alg(const char *name);
266 
267 /*
268  * cose_key
269  */
270 
271 typedef struct lws_cose_key {
272 	/* key data elements */
273 	struct lws_gencrypto_keyelem	e[LWS_GENCRYPTO_MAX_KEYEL_COUNT];
274 	/* generic meta key elements, like KID */
275 	struct lws_gencrypto_keyelem 	meta[LWS_COUNT_COSE_KEY_ELEMENTS];
276 	lws_dll2_t			list; /* used when part of a set */
277 	int				gencrypto_kty;	/**< one of LWS_GENCRYPTO_KTY_ */
278 	cose_param_t			kty;
279 	cose_param_t			cose_alg;
280 	cose_param_t			cose_curve;
281 	char 				private_key; /* nonzero = has private key elements */
282 } lws_cose_key_t;
283 
284 typedef int (*lws_cose_key_import_callback)(struct lws_cose_key *s, void *user);
285 
286 /** lws_cose_jwk_import() - Create an lws_cose_key_t object from cose_key CBOR
287  *
288  * \param pkey_set: NULL, or a pointer to an lws_dll2_owner_t for a cose_key set
289  * \param cb: callback for each jwk-processed key, or NULL if importing a single
290  *	      key with no parent "keys" JSON
291  * \param user: pointer to be passed to the callback, otherwise ignored by lws.
292  *		NULL if importing a single key with no parent "keys" JSON
293  * \param in: a single cose_key
294  * \param len: the length of the cose_key in bytes
295  *
296  * Creates a single lws_cose_key_t if \p pkey_set is NULL or if the incoming
297  * CBOR doesn't start with an array, otherwise expects a CBOR array containing
298  * zero or more cose_key CBOR, and adds each to the \p pkey_set
299  * lws_dll2_owner_t struct.  Created lws_cose_key_t are filled with data from
300  * the COSE representation and can be used with other COSE crypto ops.
301  */
302 LWS_VISIBLE LWS_EXTERN lws_cose_key_t *
303 lws_cose_key_import(lws_dll2_owner_t *pkey_set, lws_cose_key_import_callback cb,
304 		    void *user, const uint8_t *in, size_t len);
305 
306 /** lws_cose_key_export() - Create cose_key CBOR from an lws_cose_key_t
307  *
308  * \param ck: the lws_cose_key_t to export to CBOR
309  * \param ctx: the CBOR writing context (same as for lws_lec_printf())
310  * \param flags: 0 to export only public elements, or LWSJWKF_EXPORT_PRIVATE
311  *
312  * Creates an lws_jwk struct filled with data from the COSE representation.
313  */
314 LWS_VISIBLE LWS_EXTERN enum lws_lec_pctx_ret
315 lws_cose_key_export(lws_cose_key_t *ck, lws_lec_pctx_t *ctx, int flags);
316 
317 /**
318  * lws_cose_key_generate() - generate a fresh key
319  *
320  * \param context: the lws_context used to get random
321  * \param cose_kty: one of LWSCOSE_WKKTV_ indicating the well-known key type
322  * \param use_mask: 0, or a bitfield where (1 << LWSCOSE_WKKO_...) set means valid for use
323  * \param bits: key bits for RSA
324  * \param curve: for EC keys, one of "P-256", "P-384" or "P-521" currently
325  * \param kid: string describing the key, or NULL
326  *
327  * Create an lws_cose_key_t of the specified type and return it
328  */
329 LWS_VISIBLE LWS_EXTERN lws_cose_key_t *
330 lws_cose_key_generate(struct lws_context *context, cose_param_t cose_kty,
331 		      int use_mask, int bits, const char *curve,
332 		      const uint8_t *kid, size_t kl);
333 
334 LWS_VISIBLE LWS_EXTERN lws_cose_key_t *
335 lws_cose_key_from_set(lws_dll2_owner_t *set, const uint8_t *kid, size_t kl);
336 
337 LWS_VISIBLE LWS_EXTERN void
338 lws_cose_key_destroy(lws_cose_key_t **ck);
339 
340 LWS_VISIBLE LWS_EXTERN void
341 lws_cose_key_set_destroy(lws_dll2_owner_t *o);
342 
343 /* only available in _DEBUG build */
344 
345 LWS_VISIBLE LWS_EXTERN void
346 lws_cose_key_dump(const lws_cose_key_t *ck);
347 
348 /*
349  * cose_sign
350  */
351 
352 struct lws_cose_validate_context;
353 
354 
355 enum lws_cose_sig_types {
356 	SIGTYPE_UNKNOWN,
357 	SIGTYPE_MULTI,
358 	SIGTYPE_SINGLE,
359 	SIGTYPE_COUNTERSIGNED, /* not yet supported */
360 	SIGTYPE_MAC, /* only supported for validation */
361 	SIGTYPE_MAC0,
362 };
363 
364 /* a list of these result objects is the output of the validation process */
365 
366 typedef struct {
367 	lws_dll2_t		list;
368 
369 	const lws_cose_key_t	*cose_key;
370 	cose_param_t		cose_alg;
371 
372 	int			result; /* 0 = validated */
373 
374 } lws_cose_validate_res_t;
375 
376 enum {
377 	LCOSESIGEXTCB_RET_FINISHED,
378 	LCOSESIGEXTCB_RET_AGAIN,
379 	LCOSESIGEXTCB_RET_ERROR		= -1
380 };
381 
382 typedef struct {
383 	struct lws_cose_validate_context *cps;
384 	const uint8_t			 *ext;
385 	size_t				 xl;
386 } lws_cose_sig_ext_pay_t;
387 
388 typedef int (*lws_cose_sign_ext_pay_cb_t)(lws_cose_sig_ext_pay_t *x);
389 typedef int (*lws_cose_validate_pay_cb_t)(struct lws_cose_validate_context *cps,
390 					  void *opaque, const uint8_t *paychunk,
391 					  size_t paychunk_len);
392 
393 typedef struct lws_cose_validate_create_info {
394 	struct lws_context		*cx;
395 	/**< REQUIRED: the lws context */
396 	lws_dll2_owner_t		*keyset;
397 	/**< REQUIRED: one or more cose_keys */
398 
399 	enum lws_cose_sig_types		sigtype;
400 	/**<  0 if a CBOR tag is in the sig, else one of SIGTYPE_MULTI,
401 	 * SIGTYPE_SINGLE, etc*/
402 
403 	lws_cose_validate_pay_cb_t	pay_cb;
404 	/**< optional: called back with unvalidated payload pieces */
405 	void				*pay_opaque;
406 	/**< optional: passed into pay_cb callback along with payload chunk */
407 
408 	lws_cose_sign_ext_pay_cb_t	ext_cb;
409 	/**< optional extra application data provision callback */
410 	void				*ext_opaque;
411 	/**< optional extra application data provision callback opaque */
412 	size_t				ext_len;
413 	/**< if we have extra app data, this must be set to the length of it */
414 } lws_cose_validate_create_info_t;
415 
416 /**
417  * lws_cose_validate_create() - create a signature validation context
418  *
419  * \param info: struct describing the validation context to create
420  *
421  * Creates a signature validation context set up as described in \p info.
422  *
423  * You can then pass the signature cbor chunks to it using
424  * lws_cose_validate_chunk(), finialize and get the results list using
425  * lws_cose_validate_results() and destroy with lws_cose_validate_destroy().
426  */
427 LWS_VISIBLE LWS_EXTERN struct lws_cose_validate_context *
428 lws_cose_validate_create(const lws_cose_validate_create_info_t *info);
429 
430 /**
431  * lws_cose_validate_chunk() - passes chunks of CBOR into the signature validator
432  *
433  * \param cps: the validation context
434  * \param in: the chunk of CBOR (does not have to be logically complete)
435  * \param in_len: number of bytes available at \p in
436  *
437  * Parses signature CBOR to produce a list of result objects.
438  *
439  *
440  */
441 LWS_VISIBLE LWS_EXTERN int
442 lws_cose_validate_chunk(struct lws_cose_validate_context *cps,
443 			const uint8_t *in, size_t in_len, size_t *used_in);
444 
445 LWS_VISIBLE LWS_EXTERN lws_dll2_owner_t *
446 lws_cose_validate_results(struct lws_cose_validate_context *cps);
447 
448 LWS_VISIBLE LWS_EXTERN void
449 lws_cose_validate_destroy(struct lws_cose_validate_context **cps);
450 
451 struct lws_cose_sign_context;
452 
453 #define LCSC_FL_ADD_CBOR_TAG		(1 << 0)
454 #define LCSC_FL_ADD_CBOR_PREFER_MAC0	(1 << 1)
455 
456 typedef struct lws_cose_sign_create_info {
457 	struct lws_context		*cx;
458 	/**< REQUIRED: the lws context */
459 	lws_dll2_owner_t		*keyset;
460 	/**< REQUIRED: one or more cose_keys */
461 
462 	lws_lec_pctx_t			*lec;
463 	/**< REQUIRED: the cbor output context to emit to, user must
464 	 * initialize with lws_lec_init() beforehand */
465 
466 	lws_cose_sign_ext_pay_cb_t	ext_cb;
467 	/**< optional extra application data provision callback */
468 	void				*ext_opaque;
469 	/**< optional extra application data provision callback opaque */
470 	size_t				ext_len;
471 	/**< if we have extra app data, this must be set to the length of it */
472 
473 	size_t				inline_payload_len;
474 	/**< REQUIRED: size of the inline payload we will provide */
475 
476 	int				flags;
477 	/**< bitmap of  LCSC_FL_* */
478 	enum lws_cose_sig_types		sigtype;
479 	/**< 0, or sign type hint */
480 } lws_cose_sign_create_info_t;
481 
482 /**
483  * lws_cose_sign_create() - Create a signing context
484  *
485  * \param info: a structure describing the signing context you want to create
486  *
487  * This allocates and returns a signing context created according to what is in
488  * the \p info parameter.
489  *
490  * \p info must be prepared with the lws_context, a keyset to use, a CBOR
491  * output context, and the inline payload length.
492  *
493  * Returns NULL on failure or the created signing context ready to add alg(s)
494  * to.
495  */
496 
497 LWS_VISIBLE LWS_EXTERN struct lws_cose_sign_context *
498 lws_cose_sign_create(const lws_cose_sign_create_info_t *info);
499 
500 LWS_VISIBLE LWS_EXTERN int
501 lws_cose_sign_add(struct lws_cose_sign_context *csc, cose_param_t alg,
502 		  const lws_cose_key_t *ck);
503 
504 LWS_VISIBLE LWS_EXTERN enum lws_lec_pctx_ret
505 lws_cose_sign_payload_chunk(struct lws_cose_sign_context *csc,
506 			    const uint8_t *in, size_t in_len);
507 
508 LWS_VISIBLE LWS_EXTERN void
509 lws_cose_sign_destroy(struct lws_cose_sign_context **csc);
510 
511 //@}
512